RSA-2014

March 4, 2014RSA, RSA-2014, VideoComments Off on Little Bets: How Breakthrough Ideas Emerge from Small Discoveries

Published on Mar 1, 2014 Sims demonstrates that the linear problem-solving we were conditioned to embrace, actively thwarts creativity. Rather, through trying and failing in incremental ways, one gains critical information as they go from one small, experimental step to the next. Through these “little bets”, we can try imperfect ideas, …

Published on Mar 1, 2014 Security guru and bestselling author Dr. Herbert “Hugh” Thompson has seen it all—hacked voting machines, exposed airline computer insecurities and devised cell phone exploits. For the eighth year running, Thompson brings a lifetime of security expertise and a passion for our industry to “Hugh Thompson and …

Published on Feb 28, 2014 Seven years ago Scott Harrison started charity: water with a mission to bring clean drinking water to every person on the planet living without it. Learn from Scott’s personal journey from New York City nightlife to building an organization that’s funded over 9,000 water projects in …

March 4, 2014RSA, RSA-2014, VideoComments Off on State of the Hack: One Year after the APT1 Report

Published on Feb 25, 2014 Nawaf Bitar Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are under attack, and we are not allowed to fight back. Everyone has a breaking point. What’s yours?

Published on Feb 28, 2014 Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However, the cloud provides a way to address issues such as the vanished perimeter, ubiquitous connected devices and new categories of attack. This keynote addresses how we can turn the cloud …

Published on Feb 28, 2014 The pace of change in technology is accelerating and security is no different, with attackers innovating faster than the industry. Join Cisco’s Christopher Young, Senior Vice President, Security Business Group, and Padmasree Warrior, Chief Technology and Strategy Officer to learn how this phenomenon has driven defenders …

Published on Feb 27, 2014 How do you stop a motivated attacker who has unlimited resources from compromising your enterprise’s most critical data and services? Not by deploying 50 stand-alone security products and hiring a stable of expensive experts to monitor each of them. That approach doesn’t scale, it has too …

March 4, 2014RSA, RSA-2014, VideoComments Off on Stop Looking for the Silver Bullet: Start Thinking Like a Bad Guy

Published on Feb 27, 2014 Organizations worldwide spent approximately $46B on cyber security in 2013, but successful breaches increased 20% and the cost of an individual breach increased 30%. While the security industry looks for silver bullets, criminals are investing more, sharing more and working harder. We can change the way …

March 4, 2014RSA, RSA-2014, VideoComments Off on The FBI and the Private Sector: Closing the Gap in Cyber Security

Published on Feb 27, 2014 Director Comey will discuss cyber threats to our national security. We have made great strides, but there is work to be done. We need to close the gap between government and the private sector. We need to share threat information in real time. We need to …